a
    0h                     @  s   U d dl mZ d dlZd dlZd dlZd dlZd dlZdZdZe	dd ej
ejjfD Zded< d	d
dddZd
d
d
ddddZdd
d
d	d
dddZd
d
ddddZd
d
ddddZdS )     )annotationsNZ>abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789i@B c                 c  s"   | ]}|d ur|dkr|V  qd S )N/ .0sepr   r   ?/var/www/auris/lib/python3.9/site-packages/werkzeug/security.py	<genexpr>   s   r	   z	list[str]_os_alt_sepsintstr)lengthreturnc                 C  s(   | dkrt dddd t| D S )zAGenerate a random string of SALT_CHARS with specified ``length``.r   zSalt length must be at least 1. c                 s  s   | ]}t tV  qd S N)secretschoice
SALT_CHARS)r   _r   r   r   r	          zgen_salt.<locals>.<genexpr>)
ValueErrorjoinrange)r   r   r   r   gen_salt   s    r   ztuple[str, str])methodsaltpasswordr   c                 C  sD  |  d^} }| }| }| dkr|s8d}d}d}n2ztt|\}}}W n tyh   tdd Y n0 d| | | }	tj||||||	d d	| d| d| fS | d
kr0t|}
|
dkrd}t	}n>|
dkr|d }t	}n(|
dkr|d }t|d }ntdt
|||| d| d| fS td|  dd S )N:scrypti         z'scrypt' takes 3 arguments.   )r   nrpmaxmemzscrypt:Zpbkdf2r   sha256   z'pbkdf2' takes 2 arguments.zpbkdf2:zInvalid hash method 'z'.)splitencodemapr   r   hashlibr   hexlenDEFAULT_PBKDF2_ITERATIONSpbkdf2_hmac)r   r   r   argsZ
salt_bytesZpassword_bytesr"   r#   r$   r%   Zlen_args	hash_nameZ
iterationsr   r   r   _hash_internal   sH    

r2   r      )r   r   salt_lengthr   c                 C  s,   t |}t||| \}}| d| d| S )aD  Securely hash a password for storage. A password can be compared to a stored hash
    using :func:`check_password_hash`.

    The following methods are supported:

    -   ``scrypt``, the default. The parameters are ``n``, ``r``, and ``p``, the default
        is ``scrypt:32768:8:1``. See :func:`hashlib.scrypt`.
    -   ``pbkdf2``, less secure. The parameters are ``hash_method`` and ``iterations``,
        the default is ``pbkdf2:sha256:600000``. See :func:`hashlib.pbkdf2_hmac`.

    Default parameters may be updated to reflect current guidelines, and methods may be
    deprecated and removed if they are no longer considered secure. To migrate old
    hashes, you may generate a new hash when checking an old hash, or you may contact
    users with a link to reset their password.

    :param password: The plaintext password.
    :param method: The key derivation function and parameters.
    :param salt_length: The number of characters to generate for the salt.

    .. versionchanged:: 3.1
        The default iterations for pbkdf2 was increased to 1,000,000.

    .. versionchanged:: 2.3
        Scrypt support was added.

    .. versionchanged:: 2.3
        The default iterations for pbkdf2 was increased to 600,000.

    .. versionchanged:: 2.3
        All plain hashes are deprecated and will not be supported in Werkzeug 3.0.
    $)r   r2   )r   r   r4   r   hZactual_methodr   r   r   generate_password_hashI   s    "r7   bool)pwhashr   r   c                 C  sD   z|  dd\}}}W n ty*   Y dS 0 tt|||d |S )aA  Securely check that the given stored password hash, previously generated using
    :func:`generate_password_hash`, matches the given password.

    Methods may be deprecated and removed if they are no longer considered secure. To
    migrate old hashes, you may generate a new hash when checking an old hash, or you
    may contact users with a link to reset their password.

    :param pwhash: The hashed password.
    :param password: The plaintext password.

    .. versionchanged:: 2.3
        All plain hashes are deprecated and will not be supported in Werkzeug 3.0.
    r5   r'   Fr   )r(   r   hmaccompare_digestr2   )r9   r   r   r   Zhashvalr   r   r   check_password_hashp   s
    r<   z
str | None)	directory	pathnamesr   c                   s   | sd} | g}|D ]d  dkr(t   t fddtD sftj sf dsf dksf drl dS |  qt j	| S )	a2  Safely join zero or more untrusted path components to a base
    directory to avoid escaping the base directory.

    :param directory: The trusted base directory.
    :param pathnames: The untrusted path components relative to the
        base directory.
    :return: A safe path, otherwise ``None``.
    .r   c                 3  s   | ]}| v V  qd S r   r   r   filenamer   r   r	      r   zsafe_join.<locals>.<genexpr>r   z..z../N)
	posixpathnormpathanyr
   ospathisabs
startswithappendr   )r=   r>   partsr   r@   r   	safe_join   s&    	

rK   )r   r3   )
__future__r   r+   r:   rE   rB   r   r   r.   listr   rF   altsepr
   __annotations__r   r2   r7   r<   rK   r   r   r   r   <module>   s    1 '